Data Security in Wireless Sensor Networks: Attacks and Countermeasures

[1]  Prateek Thakral,et al.  An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication , 2016 .

[2]  Majid Alotaibi Security to wireless sensor networks against malicious attacks using Hamming residue method , 2019, EURASIP J. Wirel. Commun. Netw..

[3]  Javier Sanchez,et al.  Encryption techniques: A theoretical overview and future proposals , 2016, 2016 Third International Conference on eDemocracy & eGovernment (ICEDEG).

[4]  Sangeeta Solanki,et al.  Encryption and Decryption Algorithm using ASCII values with substitution array Approach , 2013 .

[5]  Mohey M. Hadhoud,et al.  Evaluating The Performance of Symmetric Encryption Algorithms , 2010, Int. J. Netw. Secur..

[6]  Alz Danny Wowor,et al.  The Existence Of Cryptography: A Study On Instant Messaging , 2017 .

[7]  Udepal Singh,et al.  An ASCII value based text data encryption System , 2013 .

[8]  Mohammed Ali Berawi,et al.  Managing Artificial Intelligence Technology for Added Value , 2020, International Journal of Technology.

[9]  Nivedita Bisht,et al.  Evaluating the Behavior of AluminumCorrosion in Hydrochloric Acid in thePresence Aqueous Extract of Olive Seeds , 2015 .

[10]  Prakash Kuppuswamy,et al.  IMPLEMENTATION OF SECURITY THROUGH SIMPLE SYMMETRIC KEY ALGORITHM BASED ON MODULO 37 , 2012, BIOINFORMATICS 2012.

[11]  R. H. Goudar,et al.  An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks , 2015 .

[12]  Asoke Nath,et al.  A New Symmetric Key Cryptography Algorithm Using Extended MSA Method: DJSA Symmetric Key Algorithm , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[13]  Suparna Biswas,et al.  A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network , 2015 .

[14]  Akanksha Mathur A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms , 2012 .

[15]  Eddie Shahril Ismail,et al.  Secure Hybrid Mode-Based Cryptosystem , 2012 .